This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Relative Path Traversal"

From OWASP
Jump to: navigation, search
Line 5: Line 5:
 
[[ASDR Table of Contents]]__TOC__
 
[[ASDR Table of Contents]]__TOC__
  
 
+
==Overview==
 
This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../".
 
This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../".
  
Line 26: Line 26:
 
More detailed information can be found on [[Path_Traversal]]
 
More detailed information can be found on [[Path_Traversal]]
  
== Severity ==
+
== Description==
 +
TBD
 +
[[Category:FIXME|need content here]]
  
High
 
 
== Likelihood of exploitation ==
 
 
High
 
  
 
==Examples ==
 
==Examples ==
Line 48: Line 45:
 
  <nowiki> http://some_site.com.br/get-files?file=../../../../etc/passwd </nowiki>
 
  <nowiki> http://some_site.com.br/get-files?file=../../../../etc/passwd </nowiki>
  
==Related Threats==
+
==Risk Factors==
 +
TBD
 +
[[Category:FIXME|need content here]]
 +
 
 +
 
 +
==Related [[Threat Agents]]==
  
[[: Category: Information Disclosure]]
+
* [[: Category: Information Disclosure]]
  
==Related Attacks==
+
==Related [[Attacks]]==
  
*[[Path Manipulation]]
+
* [[Path Manipulation]]
*[[ Path Traversal]]
+
* [[ Path Traversal]]
*[[ Resource Injection]]
+
* [[ Resource Injection]]
  
==Related Vulnerabilities==
+
==Related [[Vulnerabilities]]==
[[:Category:Input Validation Vulnerability]]
+
* [[:Category:Input Validation Vulnerability]]
  
==Related Countermeasures==
+
==Related [[Controls]]==
[[:Category:Input Validation]]
+
* [[:Category:Input Validation]]
  
  

Revision as of 00:16, 14 September 2008

This is an Attack. To view all attacks, please see the Attack Category page.



ASDR Table of Contents

Overview

This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../".

Related Security Activities

How to Avoid Path Traversal Vulnerabilities

See the OWASP Guide article on how to Avoid Path Traversal Vulnerabilities.

How to Review Code for Path Traversal Vulnerabilities

See the OWASP Code Review Guide article on how to Review Code for Path Traversal Vulnerabilities.

How to Test for Path Traversal Vulnerabilities

See the OWASP Testing Guide article on how to Test for Path Traversal Vulnerabilities.


More detailed information can be found on Path_Traversal

Description

TBD


Examples

The following URLs are vulnerable to this attack:

 http://some_site.com.br/get-files.jsp?file=report.pdf  
 http://some_site.com.br/get-page.php?home=aaa.html  
 http://some_site.com.br/some-page.asp?page=index.html  

A simple way to execute this attack is like this:

 http://some_site.com.br/get-files?file=../../../../some dir/some file  
 http://some_site.com.br/../../../../etc/shadow  
 http://some_site.com.br/get-files?file=../../../../etc/passwd 

Risk Factors

TBD


Related Threat Agents

Related Attacks

Related Vulnerabilities

Related Controls